Cloud Technology is a new platform that offers on-demand computing Peripheral such as storage,processing power,and other computer system *** is also referred to as a system that will let the consumers utilize computat...
详细信息
Cloud Technology is a new platform that offers on-demand computing Peripheral such as storage,processing power,and other computer system *** is also referred to as a system that will let the consumers utilize computational resources like databases,servers,storage,and intelligence over the *** a cloud network,load balancing is the process of dividing network traffic among a cluster of available servers to increase *** is also known as a server pool or server *** a single node is overwhelmed,balancing the workload is needed to manage unpredictable *** load balancer sends the load to another free node in this *** focus on the Balancing of workflows with the proposed approach,and we present a novel method to balance the load that manages the dynamic scheduling *** of the preexisting load balancing techniques is considered,however it is somewhat modified to fit the scenario at *** on the experimentation’s findings,it is concluded that this suggested approach improves load balancing consistency,response time,and throughput by 6%.
This article describes the application of a unique artificial intelligence model, trained on the basis of a special dataset, for drawing images. Artificial intelligence is very important in the modern world because it...
详细信息
Bike-sharing systems (BSSs) have become commonplace in most cities worldwide as an important part of many smart cities. These systems generate a continuous amount of large data volumes. The effectiveness of these BSS ...
详细信息
Blockchain technology is impacting several industries,including the creative industries and those operating in the Internet of Things(IoT).Lately,researchers'attention has been devoted to the application of blockc...
详细信息
Blockchain technology is impacting several industries,including the creative industries and those operating in the Internet of Things(IoT).Lately,researchers'attention has been devoted to the application of blockchain in the recorded music ***,thus far,no research has investigated the use of such technology in the Internet of Musical Things(IoMusT).The IoMusT is a new area emerging in industry and academy as an extension of the IoT to the musical *** IoMusT itself,as the IoT,is a distributed network of musical things,which are objects augmented with information and communication technologies serving a musical *** IoMusT vision requires,above all,IoT features such as decentralization,seamless authentication,transparency,data integrity and privacy,and self-maintenance,as well as the musical domain features such as efficient handling of copyrights and speed of royalties *** features can be brought by *** this paper,we investigate the integration of blockchain technology with the IoMusT,and we name such synthesis“Blockchain-based IoMusT”.We present a vision for this new paradigm in terms of the novel opportunities that are enabled,and we propose a set of application scenarios enabled by technological ***,we outline the open research directions in this promising area.
The Internet of Flying Things (IoFT) holds significant promise in fields like disaster management and surveillance. However, it is increasingly vulnerable to cyberattacks that can compromise the confidentiality, integ...
详细信息
The Internet of Flying Things (IoFT) holds significant promise in fields like disaster management and surveillance. However, it is increasingly vulnerable to cyberattacks that can compromise the confidentiality, integrity, and availability (CIA) of sensitive data. Despite the growing interest in proposing Intrusion Detection Systems (IDSs) for IoFT networks, current literature faces key limitations, particularly the shortage of publicly available IoFT datasets with diverse attacks, and the fact that existing IDSs lack robustness against sophisticated adversarial machine learning attacks. This paper is the first study to address these limitations by proposing a more resilient and accurate IDS tailored for IoFT networks (RIDS-IoFT). We introduce a novel IDS that leverages Generative Adversarial Networks (GANs) to generate a hybrid dataset that combines real IoFT traffic data with GAN-generated adversarial attacks, addressing the dataset diversity issue. Additionally, we introduce an innovative adversarial training method to enhance the system’s defense against evolving threats, such as Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), and Carlini & Wagner (C&W) attacks. The proposed RIDS-IoFT was evaluated using four machine learning models, Random Forest (RF), Decision Tree (DT), Support Vector Machine (SVM), and Logistic Regression (LR), on two datasets: ECU-IoFT and CICIDS2018. The IDS’s performance was assessed based on its ability to detect both traditional and adversarial attacks. The results show that the Random Forest model achieved the highest detection accuracy, up to 96.5%, demonstrating superior performance across both real and hybrid datasets. The proposed RIDS-IoFT not only enhances detection accuracy but also strengthens resilience against adversarial threats, making it suitable for resource-constrained IoFT environments. In conclusion, this study presents a comprehensive approach to securing IoFT networks by combining real and synthetic d
Students 'attendance in class is one important success parameter in face-to-face learning processes. Conventional attendance systems, such as paper-based attendance sheets or identity card systems, require a long ...
详细信息
Roshal Archive (RAR) format is one of the most widely used data archive formats, enabling users to reduce the size of data and protect it with the desired password before the data is transferred to its intended recipi...
详细信息
Demand response (DR) management systems are a potentially growing market due to their ability to maximize energy savings by allowing customers to manage their energy consumption at times of peak demand in response to ...
详细信息
Every year, Indonesians still suffer from heart and lung diseases. To anticipate many lethal effects caused by these diseases, an early diagnosis solution is needed. This research discusses the implementation of a hea...
详细信息
The assessment of an academic's performance is not solely based on the tangible results achieved. Nonetheless, the formation aspect of the Knowledge Management (KM) process, which arises in the pursuit of outcomes...
详细信息
暂无评论